Risk study identifies top pain points in 2013
The state of endpoint risk is not improving according to the fourth annual report researched by the Ponemon Institute. IT professionals reported the flood of mobile devices …
Three out of every four malware infections are caused by Trojans
PandaLabs analyzed the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks …
Mobile and cloud developments will dominate 2013
For the past several years, the IT industry’s transition to the 3rd Platform, built on mobile computing, cloud services, social networking, and big data analytics …
Most Americans uninformed about DDoS attacks
Whether motivated by an extreme form of free expression or criminal intent, distributed denial-of-service attacks (DDoS attacks) are increasingly commonplace worldwide. Yet …
Understanding basic honeypot concepts
The EU cyber security Agency ENISA is launching an in-depth study on 30 different digital traps or honeypots that can be used by CERTs to proactively detect cyber attacks. The …
Battles over online information control to escalate
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous …
Businesses bracing for security impact on Cyber Monday
Most employees are not able to recognize online threats against the corporate network and companies are most concerned that online shopping could open the network to potential …
81% don’t trust cloud security
81 percent of IT professionals express security concerns when moving data to the cloud, according to a recent survey by GreenSQL. The survey focused on one question: …
How teens hide their online activity
A European survey commissioned by McAfee has revealed an alarming disconnect between what teens are getting up to online, and what parents are aware of. Many UK teens are …
Generation Tech: Gifted but a long way from bad
They have been described as technology’s Generation Y or Generation Tech: an undisciplined, impulsive, entitled horde of twenty-something workers, seen as one of the …
Half of business information resides outside the firewall
Symantec launched its first Digital Information Index highlighting the significant impact that cloud computing and mobility are having on businesses today. There are benefits …
IRISSCERT warns Irish businesses on key cybercrime threats
IRISSCERT is to hold its fourth annual cybercrime conference this coming Thursday the 22nd of November where they will highlight key trends and issues that businesses in …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted